Skip to main content

Universal Authentication Gateway for MCP (Model Context Protocol) Servers

Project description

AuthMCP Gateway

Secure authentication proxy for Model Context Protocol (MCP) servers

License: MIT Python 3.11+ Docker MCP

AuthMCP Gateway provides centralized authentication, authorization, and monitoring for MCP servers. It acts as a secure proxy between clients and your MCP backends, adding JWT-based authentication, rate limiting, real-time monitoring, and comprehensive security logging.

Features

๐Ÿ” Authentication & Authorization

  • OAuth 2.0 + JWT - Industry-standard authentication flow
  • User Management - Multi-user support with role-based access
  • Backend Token Management - Secure storage and auto-refresh of MCP server credentials
  • Rate Limiting - Per-user request throttling with configurable limits

๐Ÿ“Š Real-Time Monitoring

  • Live MCP Activity Monitor - Real-time request feed with auto-refresh
  • Performance Metrics - Response times, success rates, requests/minute
  • Security Event Logging - Unauthorized access attempts, rate limiting, suspicious activity
  • Health Checking - Automatic health checks for all connected MCP servers

๐ŸŽ›๏ธ Admin Dashboard

  • User Management - Create, edit, and manage users
  • MCP Server Configuration - Add and configure backend MCP servers
  • Token Management - Monitor token health and manual refresh
  • Security Events - View and filter security events
  • API Testing - Built-in MCP testing interface

๐Ÿ›ก๏ธ Security

  • JWT token-based authentication with refresh tokens
  • Secure credential storage with encrypted database support
  • CORS protection and request validation
  • Security event logging and monitoring
  • File-based logging - No database bloat, 30-day rotation
  • Built-in security testing guide

Documentation

๐Ÿ“š Complete Documentation - Full documentation index

Quick Links:

Quick Start

Docker Compose (Recommended)

  1. Clone and configure:

    git clone https://github.com/yourusername/authmcp-gateway.git
    cd authmcp-gateway
    cp .env.example .env
    # Edit .env with your settings
    
  2. Start the gateway:

    docker-compose up -d
    
  3. Access admin panel:

Python Package

pip install authmcp-gateway
authmcp-gateway

Then access http://localhost:8000/ for setup.

Configuration

Environment Variables

# Gateway Settings
GATEWAY_PORT=9105              # Gateway port (default: 8000)
JWT_SECRET=your-secret-key     # JWT signing key (auto-generated if not set)
REQUIRE_AUTH=true              # Enable authentication (default: true)

# Admin Settings
ADMIN_USERNAME=admin           # Initial admin username
ADMIN_PASSWORD=secure-password # Initial admin password

Adding MCP Servers

Via Admin Panel:

  1. Navigate to MCP Servers โ†’ Add Server
  2. Enter server details:

Via API:

curl -X POST http://localhost:9105/admin/api/mcp-servers \
  -H "Authorization: Bearer YOUR_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{
    "name": "GitHub MCP",
    "url": "http://github-mcp:8000/mcp",
    "backend_token": "optional-token"
  }'

Usage

For End Users

  1. Login to get access token:

    curl -X POST http://localhost:9105/auth/login \
      -H "Content-Type: application/json" \
      -d '{"username":"your-username","password":"your-password"}'
    
  2. Use token to access MCP endpoints:

    curl -X POST http://localhost:9105/mcp \
      -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \
      -H "Content-Type: application/json" \
      -d '{"jsonrpc":"2.0","id":1,"method":"tools/list"}'
    

For Administrators

Admin Panel Features:

  • Dashboard - Overview of users, servers, and activity
  • MCP Activity - Real-time monitoring of all MCP requests
  • Security Events - View unauthorized access attempts and suspicious activity
  • User Management - Create and manage user accounts
  • Token Management - Monitor and refresh backend tokens

Architecture

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚   Client    โ”‚
โ”‚  (Claude,   โ”‚
โ”‚   etc.)     โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”˜
       โ”‚ JWT Auth
       โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚   AuthMCP Gateway           โ”‚
โ”‚                             โ”‚
โ”‚  โ€ข Authentication           โ”‚
โ”‚  โ€ข Rate Limiting            โ”‚
โ”‚  โ€ข Security Logging         โ”‚
โ”‚  โ€ข Request Routing          โ”‚
โ”‚  โ€ข Health Monitoring        โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
       โ”‚
       โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
       โ–ผ          โ–ผ          โ–ผ          โ–ผ
  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
  โ”‚GitHub   โ”‚ โ”‚  RAG   โ”‚ โ”‚ Home   โ”‚ โ”‚Custom  โ”‚
  โ”‚MCP      โ”‚ โ”‚  MCP   โ”‚ โ”‚Assistantโ”‚ โ”‚ MCP    โ”‚
  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

API Endpoints

Public Endpoints

  • POST /auth/login - User login
  • POST /auth/register - User registration (if enabled)
  • POST /auth/refresh - Refresh access token
  • GET /.well-known/oauth-authorization-server - OAuth discovery

Protected Endpoints

  • POST /mcp - Aggregated MCP endpoint (all servers)
  • POST /mcp/{server_name} - Specific MCP server endpoint
  • GET /auth/me - Current user info
  • POST /auth/logout - Logout

Admin Endpoints

  • GET /admin - Admin dashboard
  • GET /admin/mcp-activity - Real-time MCP monitoring
  • GET /admin/security-logs - Security events
  • GET /admin/users - User management
  • GET /admin/mcp-servers - MCP server configuration
  • Plus full REST API for management

Security

Testing Security

See docs/SECURITY_TESTING.md for:

  • Manual security tests
  • Automated testing script
  • Production deployment checklist
  • Security best practices

Security Features

  • โœ… JWT-based authentication with refresh tokens
  • โœ… Rate limiting per user
  • โœ… Security event logging
  • โœ… MCP request tracking with suspicious activity detection
  • โœ… Health monitoring for backend servers
  • โœ… CORS protection
  • โœ… Secure credential storage

Development

Local Development

# Clone repository
git clone https://github.com/yourusername/authmcp-gateway.git
cd authmcp-gateway

# Create virtual environment
python3 -m venv venv
source venv/bin/activate  # or `venv\Scripts\activate` on Windows

# Install dependencies
pip install -e .

# Run gateway
authmcp-gateway

Running Tests

pytest tests/

Project Structure

authmcp-gateway/
โ”œโ”€โ”€ src/authmcp_gateway/
โ”‚   โ”œโ”€โ”€ admin/           # Admin panel routes and logic
โ”‚   โ”œโ”€โ”€ auth/            # Authentication & authorization
โ”‚   โ”œโ”€โ”€ mcp/             # MCP proxy and handlers
โ”‚   โ”œโ”€โ”€ security/        # Security logging and monitoring
โ”‚   โ”œโ”€โ”€ middleware.py    # Request middleware
โ”‚   โ””โ”€โ”€ app.py           # Main application
โ”œโ”€โ”€ templates/           # Jinja2 templates (admin UI)
โ”œโ”€โ”€ docs/                # Documentation
โ”œโ”€โ”€ tests/               # Test suite
โ””โ”€โ”€ docker-compose.yml   # Docker deployment

Monitoring

Real-Time Dashboard

Access /admin/mcp-activity for:

  • Live request feed (updates every 3 seconds)
  • Requests per minute
  • Average response times
  • Success rates
  • Top tools usage
  • Per-server statistics

Logs

View logs in real-time:

docker logs -f authmcp-gateway

Troubleshooting

Cannot access admin panel:

  • Ensure you've completed the setup wizard at /setup
  • Check that cookies are enabled
  • Verify JWT_SECRET is set correctly

MCP server shows as offline:

  • Check server URL is correct and reachable
  • Verify backend token if required
  • View error details in MCP Servers page

401 Unauthorized errors:

  • Token may have expired - use refresh token
  • Verify Authorization header format: Bearer YOUR_TOKEN
  • Check user has permission for the MCP server

For more help, see docs/SECURITY_TESTING.md.

License

MIT License - see LICENSE file for details.

Contributing

Contributions welcome! Please:

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Submit a pull request

Roadmap

  • Prometheus metrics export
  • WebSocket support for real-time updates
  • Per-tool rate limiting
  • Enhanced security testing automation
  • Multi-tenancy support
  • API key authentication option

Built with โค๏ธ for the MCP ecosystem

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

authmcp_gateway-1.0.0.tar.gz (119.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

authmcp_gateway-1.0.0-py3-none-any.whl (143.1 kB view details)

Uploaded Python 3

File details

Details for the file authmcp_gateway-1.0.0.tar.gz.

File metadata

  • Download URL: authmcp_gateway-1.0.0.tar.gz
  • Upload date:
  • Size: 119.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.10

File hashes

Hashes for authmcp_gateway-1.0.0.tar.gz
Algorithm Hash digest
SHA256 87492b7608fc91e102c7f903e3a35fabbad1cdb0bbde54bbe356bf97d1f7e8b6
MD5 89f7541d9dfaae9b0338351c0c8036de
BLAKE2b-256 e824da741c2efa783053d03ad0b30142b89430eca2183cd3654fe5d6f6aeebae

See more details on using hashes here.

File details

Details for the file authmcp_gateway-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: authmcp_gateway-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 143.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.10

File hashes

Hashes for authmcp_gateway-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 5d7f70098fc620c768a5b1890983e1d3e1d83718376dead1a79f62c8dba0825e
MD5 73c5ee1219041ebbe0b851caffd5381d
BLAKE2b-256 4ed451d0e9072f2ef0939b052bea4fd9dfe4ef58ca5cbdcd48bde282e45bfe7f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page